Keyword: URL
43763 Total Search   |   Showing Results : 4401 - 4420
\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Server = "ldap.bigfoot.com" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP URL = "http://www.{BLOCKED
"ldap.bigfoot.com" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP URL = "http://www.{BLOCKED}t.com" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts
Manager\Accounts\Bigfoot LDAP Server = "ldap.bigfoot.com" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP URL = "http://www.{BLOCKED}t.com" HKEY_CURRENT_USER\Software
" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP URL = "http://www.{BLOCKED}t.com" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Search
Manager\Accounts\Bigfoot LDAP Server = "ldap.bigfoot.com" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP URL = "http://www.{BLOCKED}t.com" HKEY_CURRENT_USER\Software
" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP URL = "http://www.{BLOCKED}t.com" HKEY_CURRENT_USER\Software\Microsoft\ Internet Account Manager\Accounts\Bigfoot LDAP Search
entry is 2 .) HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ http URL Protocol = "" HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ http\DefaultIcon (Default) = "%SystemRoot%\system32\url.dll,0" (Note: The default value data
binary attachment which is the malware's configuration file. http://{BLOCKED}utcaffee2.net/photos/zb1/cc/ccc.php The configuration file contains encrypted information. When decrypted, it reveals the URL
NNTP User Name NNTP Server IMAP Server IMAP User Name HTTP User HTTP Server URL POP3 User IMAP User HTTPMail User Name HTTPMail Server SMTP User It retrieves cookies, digital certificates and clipboard
NNTP User Name NNTP Server IMAP Server IMAP User Name HTTP User HTTP Server URL POP3 User IMAP User HTTPMail User Name HTTPMail Server SMTP User It retrieves cookies, digital certificates and clipboard
Security\Update\winsvrupd.exe" If scheduled task creation fails, it will create an autorun registry to execute its drop copy. Uses the embedded configuration for its coin mining routine: Algo = rx/0 URL =
connect to a URL to download a malicious file that Trend Micro detects as BKDR_BADEY.A . This backdoor program also connects to other URLs to download encrypted files. These files, when decrypted, contain
good URL reputation service that can rate and block access to malicious domains and specific URLs. Trend Micro Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */
}ought.org {BLOCKED}rprise.org {BLOCKED}zoo.org {BLOCKED}wone.org Rogue Antivirus Routine When users agree to buy the software, it connects to the following URL to continue the purchase: http://{BLOCKED
rogue product, users are directed to a certain website asking for sensitive information, such as credit card numbers. When users agree to buy the software, it connects to the following URL to continue the
following URL to continue the purchase: http://{BLOCKED}ant.org/customers/buy.php Connects to URLs/IPs, Display fake alerts
Details It displays the following Graphical User Interface (GUI): When users agree to buy the software, it connects to the following URL to continue the purchase: {BLOCKED}igger.com {BLOCKED}gs-866650.com
following information on the affected computer: HTTP Password HTTP Server URL HTTP User IMAP Password IMAP Server IMAP User POP3 Password POP3 Server POP3 User SMTP Email Address SMTP Server Other Details
malware. It also contains the drop zone and the URL where a backup configuration file can be downloaded. Information Theft It monitors the browser activities of the affected system, specifically the address
information, the URL where the configuration file can be downloaded, the codes for web inject, and the monitored URLs. PWS:Win32/Zbot.gen!Y (Microsoft) 12 for 2012: What Will The New Year Bring?